Paper
3 October 2022 A privacy-preserving data collection scheme for smart agriculture based on edge blockchain
Hongbin Fan, Shouping Gao
Author Affiliations +
Proceedings Volume 12290, International Conference on Computer Network Security and Software Engineering (CNSSE 2022); 1229006 (2022) https://doi.org/10.1117/12.2640769
Event: International Conference on Computer Network Security and Software Engineering (CNSSE 2022), 2022, Zhuhai, China
Abstract
Smart agriculture is a new agricultural production model integrating Internet, cloud computing and Internet of things, which provides precision planting and online services for agricultural production. The accuracy and reliability of agricultural data collection affect agricultural decision-making, so it is very necessary to protect agricultural privacy data. Existing solutions usually require the cooperation of trusted institutions, which is not practical. Blockchain adopts the PBFT consensus algorithm and does not require a trusted third party. Edge computing can greatly improve the efficiency of data aggregation and save data transmission time. Hence, this paper proposes a data collection scheme with a faulttolerant property based on blockchain and edge computing to protect sensitive information in smart agriculture. It is proved to be data security, privacy protection, and fault tolerance with the performance simulation and security analysis.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Hongbin Fan and Shouping Gao "A privacy-preserving data collection scheme for smart agriculture based on edge blockchain", Proc. SPIE 12290, International Conference on Computer Network Security and Software Engineering (CNSSE 2022), 1229006 (3 October 2022); https://doi.org/10.1117/12.2640769
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Agriculture

Computer security

Tolerancing

Internet

Fluctuations and noise

Network security

Device simulation

Back to Top